A Defense Approach of DAD Attack in Stateless Auto Configuration

In stateless address auto configuration, node needs to carry out duplicate address detection before using a new IP address. In the detection process, once a malicious node claims that the resolve IP address is occupied, the node's address configuration will fail. For this case, WAY(who are you)...

Full description

Saved in:
Bibliographic Details
Main Authors: Guangjia Song, Zhenzhou Ji, Hui Wang
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2014-04-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.04.008/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529339887222784
author Guangjia Song
Zhenzhou Ji
Hui Wang
author_facet Guangjia Song
Zhenzhou Ji
Hui Wang
author_sort Guangjia Song
collection DOAJ
description In stateless address auto configuration, node needs to carry out duplicate address detection before using a new IP address. In the detection process, once a malicious node claims that the resolve IP address is occupied, the node's address configuration will fail. For this case, WAY(who are you)mechanism as a defensive approach was proposed. WAY mechanism uses reverse address confirmation, self-declaration and WAY-table inspection to filter the spoofing packets, which make attackers' cost increase and cannot carry out secondary attack. The experiments show that WAY mechanism can effectively compensate the security flaws of neighbor discovery protocol, significantly increase the success rate of stateless address auto configuration.
format Article
id doaj-art-6d5765878828422eb75dad33e12cfb3a
institution Kabale University
issn 1000-0801
language zho
publishDate 2014-04-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-6d5765878828422eb75dad33e12cfb3a2025-01-15T03:20:03ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012014-04-0130546059622258A Defense Approach of DAD Attack in Stateless Auto ConfigurationGuangjia SongZhenzhou JiHui WangIn stateless address auto configuration, node needs to carry out duplicate address detection before using a new IP address. In the detection process, once a malicious node claims that the resolve IP address is occupied, the node's address configuration will fail. For this case, WAY(who are you)mechanism as a defensive approach was proposed. WAY mechanism uses reverse address confirmation, self-declaration and WAY-table inspection to filter the spoofing packets, which make attackers' cost increase and cannot carry out secondary attack. The experiments show that WAY mechanism can effectively compensate the security flaws of neighbor discovery protocol, significantly increase the success rate of stateless address auto configuration.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.04.008/network securityaddress resolutionIPv6stateless address auto configurationduplicate address detection
spellingShingle Guangjia Song
Zhenzhou Ji
Hui Wang
A Defense Approach of DAD Attack in Stateless Auto Configuration
Dianxin kexue
network security
address resolution
IPv6
stateless address auto configuration
duplicate address detection
title A Defense Approach of DAD Attack in Stateless Auto Configuration
title_full A Defense Approach of DAD Attack in Stateless Auto Configuration
title_fullStr A Defense Approach of DAD Attack in Stateless Auto Configuration
title_full_unstemmed A Defense Approach of DAD Attack in Stateless Auto Configuration
title_short A Defense Approach of DAD Attack in Stateless Auto Configuration
title_sort defense approach of dad attack in stateless auto configuration
topic network security
address resolution
IPv6
stateless address auto configuration
duplicate address detection
url http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.04.008/
work_keys_str_mv AT guangjiasong adefenseapproachofdadattackinstatelessautoconfiguration
AT zhenzhouji adefenseapproachofdadattackinstatelessautoconfiguration
AT huiwang adefenseapproachofdadattackinstatelessautoconfiguration
AT guangjiasong defenseapproachofdadattackinstatelessautoconfiguration
AT zhenzhouji defenseapproachofdadattackinstatelessautoconfiguration
AT huiwang defenseapproachofdadattackinstatelessautoconfiguration